payment information

Results 1 - 25 of 36Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Oct 30, 2018
How Snapper Further Protects Data in Amazon S3 Using CWP for Storage Abstract: Snapper, a New Zealand-based company that develops custom account-based solutions, was creating an online concessions payment program for local students and needed a way to enhance the security of their personal information on Amazon Web Services (AWS). The solution had to further protect online student profiles and associated payment details stored in Amazon Simple Storage Service (Amazon S3) against malware and threats. Snapper chose Symantec Cloud Workload Protection for Storage (CWP for Storage) for its advanced malware protection, elastic scalability, and simple deployment requiring only a few hours.
Tags : 
snapper, data, amazon, cwp, storage
    
AWS
Published By: AWS     Published Date: Oct 30, 2018
Snapper, a New Zealand-based company that develops custom account-based solutions, was creating an online concessions payment program for local students and needed a way to enhance the security of their personal information on Amazon Web Services (AWS). The solution had to further protect online student profiles and associated payment details stored in Amazon Simple Storage Service (Amazon S3) against malware and threats. Snapper chose Symantec Cloud Workload Protection for Storage (CWP for Storage) for its advanced malware protection, elastic scalability, and simple deployment requiring only a few hours.
Tags : 
data, amazon, cwp, storage
    
AWS
Published By: Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
Cylance
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Much has been written about Payment Services Directive 2 (PSD2) and its potential to herald a new era of open banking where banks no longer have a monopoly on payment services. Instead they will be forced to provide full access to customer accounts to third parties looking to provide financial services of their own, on top of banks’ existing data and infrastructure. All of this could prove to be true, just not on January 13th 2018, the deadline for national governments to transpose PSD2 into law. This is because there is still so much to be decided and clarified. The European Banking Authority’s longawaited regulatory technical standards (RTS) on strong customer authentication (SCA) were issued in March 2017 but missing some of the finer details, such as the methods to remotely access customer data and account information and the measures around the use of application programming interfaces (APIs) and screen-scraping.
Tags : 
    
CA Technologies EMEA
Published By: Ixaris OTA     Published Date: Jan 25, 2018
Travel agents, tour operators and travel wholesalers are typically spending thousands in unnecessary costs each year. And in a fiercely competitive market operating on high volumes and low margins, ensuring efficiency with sales and purchasing systems is no easy task. Especially when it comes to payments. If you want to find out where you’re losing money, how efficient your platform really is and the simple way to eliminate these costs, read this white paper. It explores the top three areas where you could be overspending. And it reveals the statistics behind your unnecessary costs – giving you the information you need to save money and drive efficiency.
Tags : 
    
Ixaris OTA
Published By: IBM     Published Date: Aug 23, 2017
Banks today are continuously challenged to meet rigorous regulatory requirements. They must implement strict governance programs that enable them to comply with a wide variety of regulations stemming from the financial crisis that began in 2007, including the DoddFrank Act, Basel Committee on Banking Supervision regulations, the General Data Protection Regulation (GDPR), the Revised Payment Services Directive (PSD2) and the revised Markets in Financial Instruments Directive To keep pace with regulatory changes, many banks will need to reapportion their budgets to support the development of new systems and processes. Regulators continually indicate that the banks must be able to provide, secure and deliver high-quality information that is consistent and mature.
Tags : 
risk mitigation, data aggregation, risk reporting, banking
    
IBM
Published By: Adobe     Published Date: Aug 02, 2017
Get in on the content creation game and use it to improve the journey for your customers. Consumers are taking a much more active role in their finances; advice is freely available and most financial administration, from payments to trading, can now be done from your phone. Provide consistent messaging based on customer journey analytics; find out what information your customers are looking for, and provide the answers through the fewest possible clicks. Continually track and test these journeys to optimise the content and messaging.
Tags : 
consumers, customer success, content creation, content optimisation, adobe, finances
    
Adobe
Published By: IBM     Published Date: Jun 08, 2017
The healthcare payer ecosystem in the United States has changed dramatically over the last decade and is expected to evolve at an even faster pace over the next few years. Many world-class companies involved in healthcare payment processing are finding themselves constrained by their existing information technology infrastructure. The silos that they built around business-to-business (B2B) processing are constraining them, making it difficult to achieve governmental mandates and (more importantly) increase processing efficiency and competitive advantage. Gone are the days of a small set of data following static and simple standards traded between a limited set of organizations. Gone are the days where the rules for when data is valid versus invalid can expressed in a paragraph or two. Gone are the days when information about a healthcare payment was almost entirely about the "who," "when," and "how much."
Tags : 
hipaa, healthcare, b2b, organizational strategy, affordable care
    
IBM
Published By: Bronto     Published Date: May 18, 2017
Convenience is absolutely critical to succeeding in e-commerce. Any glitches along the path to purchase potentially result in a lost sale. That's one reason we think Apple Pay's new mobile payment feature that uses a fingerprint is going to be a game changer. Its another step in reducing hurdles to online buying. You see it, you select it, you pay with your finger. What could be more convenient? Not interested in Apple Pay? Or unable to use it? At the very least, make sure customers that shop on multiple devices are recognized, no matter which device they log into. Giving them access to their stored information will make for a much smoother checkout.
Tags : 
bronto, digital marketers, program management, customer support, critical data source, email management, world wide business research, mobile devices, visual commerce, virtual reality, overseas market
    
Bronto
Published By: Dun & Bradstreet     Published Date: Mar 03, 2017
Creating predictive analytics from alternative data has become the current focus of the biggest quant trading firms in the industry The democratization of financial services data and technology, together with more intense competition, makes the needs of today’s market participants vastly different from those of previous generations. Firms must locate untapped sources of data for both public and non-public companies. This alternative data, such as payment data and other non-public information, from sources beyond the common channels, can be a predictive indicator of market performance; a difference maker in assisting firms as they develop models to evaluate their investments. By combining our unique data sets with advanced analytics, traders, analysts and managers can seek predictive signals and actionable information utilizing their own models. View our research report to learn how alternative data, our 'Information Alpha,' can help you earn differentiated investment returns.
Tags : 
    
Dun & Bradstreet
Published By: Globalscape     Published Date: Jun 27, 2014
The PCI Security Standards Council issued version 3 of their PCI DSS guidelines for processing electronic payments. Our whitepaper details the newest additions to the guidelines as well as tools and resources to help organizations comply with the standards.
Tags : 
globalscape, file transfer, security, compliance, payment information, electronic payments, ecommerce, security, information management, electronic processing
    
Globalscape
Published By: Alert Logic     Published Date: Jun 12, 2014
While e-commerce remains a relatively small percentage of overall retail spending (rates vary by country, but are generally in the 5–10% range), it continues to grow. The ongoing growth of e-commerce suggests that one of the initial objections to online shopping—concerns about whether consumer personal information would be secure—has been largely overcome. Standards like PCI, and payment services like PayPal, along with a general increase in security awareness, have gone a long way to change the perception of online shopping. Learn more about Information Security in the E-commerce Sector.
Tags : 
cloud security, cloud e-commerce, cloud pci, e-commerce security, compliance, it management
    
Alert Logic
Published By: Rapid7     Published Date: Jul 24, 2013
The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
Tags : 
rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing, atm, business technology
    
Rapid7
Published By: Rapid7     Published Date: Nov 27, 2012
The Payment Card Industry Data Security Standards (PCI DSS), with its over 200 requirements, can seem like a daunting set of regulations. Nonetheless, if your organization handles any kind of credit card information, you must be PCI DSS compliant. As difficult as this can seem, you can get expert help with our new eBook.
Tags : 
rapid7, technology, security, it management, business technology
    
Rapid7
Published By: Akamai     Published Date: Jul 01, 2011
The whitepaper shows how merchants can rid their systems of sensitive payment information.
Tags : 
akamai, enterprise payment security 2.0, payment security management, edge tokenization, pci compliance, credit card data, cybersource, payment data capture, 2.0
    
Akamai
Published By: NetIQ     Published Date: Dec 23, 2010
The Payment Card Industry Data Security Standard (PCI DSS) establishes standard requirements protecting cardholder information. It applies to all entities that store, process, or transmit cardholder data, such as retail merchants, payment processors, and banks.
Tags : 
netiq, roi, pci dss, compliance
    
NetIQ
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn, litigation, fines, personally identifiable information, pii, pci, payment card industry, phi, protected health information, pfi, personal financial information, pfi access control, audit
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp, hackers, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection, encryption, ip loss, intellectual property, loss of intellectual property, loss of reputation
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: ArcSight     Published Date: Mar 04, 2009
Whitepaper highlighting the twelve PCI DSS requirements and the technology necessary to address the PCI DSS 1.2 requirements.
Tags : 
pci dss, pci dss 1.2, log management, arcsight logger, siem, payment card industry, pci, dss, data security standard, data encryption, access controls, activity monitoring, logging, retail, merchants, cardholder data
    
ArcSight
Published By: IBM     Published Date: Jan 12, 2009
Retail banks are in a state of transformation all over the world. They must integrate new remote payment systems, digitize process integration and update credit management. Watch this webcast to see how IBM WebSphere Portal is helping these companies deliver targeted information to support decision-making, and to aid in their transformation.
Tags : 
ibm, websphere portal banking initiative, websphere portal, portal solutions for retail banks, updating credit management, internet banking delivery, networking, it management
    
IBM
Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows
    
Likewise Software
Published By: TriGeo Network Security     Published Date: Oct 03, 2008
Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.
Tags : 
trigeo network security, payment card industry (pci), data security standard (dss), networking
    
TriGeo Network Security
Previous   1 2    Next    
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.